• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Psdot 2 design and implementation of persuasive cued  click-points and evaluation of a
 

Psdot 2 design and implementation of persuasive cued click-points and evaluation of a

on

  • 2,988 views

FINAL YEAR IEEE PROJECTS,

FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS

Statistics

Views

Total Views
2,988
Views on SlideShare
2,983
Embed Views
5

Actions

Likes
0
Downloads
84
Comments
1

2 Embeds 5

http://www.slashdocs.com 4
http://www.docshut.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • which algorithm r used in persuasive cued click points
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Psdot 2 design and implementation of persuasive cued  click-points and evaluation of a Psdot 2 design and implementation of persuasive cued click-points and evaluation of a Document Transcript

    • DESIGN AND IMPLEMENTATION OF PERSUASIVE CUED CLICK-POINTS AND EVALUATION OF A KNOWLEDGE-BASED AUTHENTICATION MECHANISMOBJECTIVE: The objective of this project is to provide the security for any websites byusing graphical passwords with view port and persuasive cued click-points.PROBLEM DEFINITION: The problem with this scheme is that the number of predefined regions issmall, perhaps a few dozens in a picture. The password may have to be up to 12clicks for adequate security, again tedious for the user. Another problem of thissystem is the need for the predefined regions to be readily identifiable.ABSTRACT: In this project, a graphical password system with a supportive soundsignature to increase the remembrance of the password is discussed. In proposedwork a click-based graphical password scheme called Cued Click Points (CCP) ispresented. In this system a password consists of sequence of some images in whichuser can select one click-point per image. In addition user is asked to select asound signature corresponding to each click point this sound signature will be usedto help the user in recalling the click point on an image.
    • EXISTING SYSTEM: In the existing system, Brostoff and sasse carried out an empirical study ofpassfaces, which illustrates well how a graphical password recognition systemtypically operates. Blonder-style passwords are based on cued recall. A user clickson several previously chosen locations in a single image to log in. As implementedby Passlogix Corporation, the user chooses several predefined regions in an imageas his or her password. To log in the user has to click on the same regions in effect,cued click points (ccp) is a proposed alternative to passpoints. In ccp, users clickone point on each of 5 images rather than on five points on one image. It offerscued-recall and introduces visual cues that instantly alert valid users if they havemade a mistake when entering their latest click-point (at which point they cancancel their attempt and retry from the beginning). It also makes attacks based onhotspot analysis more challenging. Each click results in showing a next-image, inEffect leading users down a “path” as they click on their sequence of points. Awrong click leads down an incorrect path, with an explicit indication ofauthentication failure only after the final click. Users can choose their images onlyto the extent that their click-point dictates the next image. While the predictability problem can be solved by disallowing user choiceand assigning passwords to users, this usually leads to usability issues since userscannot easily remember such random passwords. Number of graphical passwordsystems have been developed, Study shows that text-based passwords suffers withboth security and usability problems
    • DISADVANTAGE: The problem with this scheme is that the number of predefined regions issmall, perhaps a few dozens in a picture. The password may have to be up to 12clicks for adequate security, again tedious for the user. Another problem of thissystem is the need for the predefined regions to be readily identifiable.PROPOSED SYSTEM: In the proposed work we have integrated sound signature to help in recallingthe password. No system has been devolved so far which uses sound signature ingraphical password authentication. Study says that sound signature or tone can beused to recall facts like images, text. In daily life we see various examples ofrecalling an object by the sound related to that object enters User ID and select onesound frequency which he want to be played at login time, a tolerance value is alsoselected with will decide that the user is legitimate or an imposter. To createdetailed vector user has to select sequence of images and clicks on each image atclick points of his choice. Profile vector is created.ADVANTAGE:  To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created.
    •  Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points.  System showed very good Performance in terms of speed, accuracy, and ease of use.SYSTEM FLOW CHART:
    • Registration Login trail Process Read User ID Get unique user ID from user Fetch User profile vector Select sound signature Show Image from user profile Detect mouse position on Select tolerance level Image Select image If mouse position=us er profile Select & click on pass point Play sound signature Want More image Play random sound Get click points and prepare No.of login vector image<5 Compare login and user Vector Create User Profile vector Log on If d<D Imposter User Profile VectorALGORITHM USED:
    • 1. MD 5(Message-Digest) 2. DES(Data Encryption Standard)SYSTEM REQUIREMENTS: Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : Windows XP. • Coding Language : ASP.Net with C#. • Data Base : SQL Server 2005. APPLICATIONS: 1. Secured Online Access. 2. Multilevel Security For Remote Access. 3. Security For Banking Sectors.